11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Since its initial development in 2005, SQUARE has been adapted to acquisition and extended to<br />

include privacy; tools have been developed to support its use.<br />

In addition to developing analysis methods and tools, <strong>SEI</strong> researchers explored ways to identify<br />

organizational and systemic risks that could affect s<strong>of</strong>tware security. The Mission Assurance<br />

Analysis Protocol [Alberts 2005] was initiated to identify<br />

and understand inherent operational risks when management<br />

control <strong>of</strong> work processes is distributed among<br />

The View from O<strong>the</strong>rs<br />

multiple organizations. The Vendor Risk Assessment Our company provided <strong>the</strong>m with<br />

and Threat Evaluation [Lipson 2001] was developed to an opportunity to assess a manyfaceted<br />

product and <strong>the</strong>y re-<br />

assess vendor capabilities as an indicator <strong>of</strong> product<br />

quality. In late 2006, <strong>the</strong> <strong>SEI</strong> began research on supply sponded graciously by sharing <strong>the</strong><br />

chain integrity [Ellison 2010a]; <strong>SEI</strong> experts defined risk different techniques <strong>the</strong>y used to<br />

management approaches (see paper by Croll [Croll analyze <strong>the</strong> security aspects <strong>of</strong> our<br />

2013]) that can be used during acquisition, development, application. Their results gave us<br />

and transit, as well as when components are integrated insight that has since influenced<br />

with o<strong>the</strong>r s<strong>of</strong>tware and when changes occur in <strong>the</strong> environment<br />

and in attack techniques after deployment. To configuration.<br />

our application development and<br />

address complexity, <strong>the</strong> <strong>SEI</strong> developed two frameworks, – SQUARE client, a s<strong>of</strong>tware<br />

starting in 2008—<strong>the</strong> Survivability Analysis Framework development company<br />

[Ellison 2010b], a structured view <strong>of</strong> people, activities,<br />

We identify 23 activities that are<br />

and technology that helps organizations characterize <strong>the</strong><br />

essential to engineer complete and<br />

complexity <strong>of</strong> dynamic multi-system and multi-organizational<br />

business processes and <strong>the</strong> S<strong>of</strong>tware Assurance<br />

detailed security requirements. We<br />

use <strong>the</strong>se 23 activities as a basis to<br />

Modeling Framework [Siviy 2009], which enables organizations<br />

to tie <strong>the</strong>ir current environment to opera-<br />

compare five different requirements<br />

engineering processes. Our<br />

tional needs and identify areas where <strong>the</strong>y can improve<br />

analysis shows that SQUARE incorporates<br />

more <strong>of</strong> <strong>the</strong>se activities<br />

assurance. In 2010, <strong>the</strong> <strong>SEI</strong> began work on a risk-based<br />

approach for measuring and monitoring <strong>the</strong> security<br />

than o<strong>the</strong>r processes.<br />

characteristics <strong>of</strong> interactively complex, s<strong>of</strong>tware-reliant<br />

– Muhammad Umair Ahmed<br />

systems across <strong>the</strong> lifecycle and supply chain. The Integrated<br />

Measurement Analysis Framework [Alberts 2010]<br />

Khan and Mohammed<br />

Zulkernine<br />

integrates performance data for individual components to<br />

[Khan 2009]<br />

provide a consolidated view <strong>of</strong> system performance. The<br />

Mission Risk Diagnostic [Alberts 2012] analyzes <strong>the</strong> risk<br />

to <strong>the</strong> system as a whole for a comprehensive view <strong>of</strong> <strong>the</strong> overall risk to a system’s mission.<br />

In 2013, with DHS sponsorship, <strong>the</strong> <strong>SEI</strong> created a cybersecurity risk management strategy to aid<br />

alert originators planning to use <strong>the</strong> new wireless emergency alerting (WEA) capability implemented<br />

by <strong>the</strong> Federal Emergency Management Agency (FEMA) in April 2013 [Woody 2013].<br />

They can use <strong>the</strong> strategy throughout WEA adoption, operations, and sustainment to decrease vulnerability<br />

to attack and manage risk in <strong>the</strong> face <strong>of</strong> changing threats. As part <strong>of</strong> this effort, <strong>the</strong> <strong>SEI</strong><br />

is also working with <strong>the</strong> developers <strong>of</strong> alert originator s<strong>of</strong>tware to increase WEA cybersecurity.<br />

Recognizing that <strong>the</strong> principle <strong>of</strong> building security in at <strong>the</strong> start had to extend to <strong>the</strong> workforce,<br />

DHS sponsored <strong>the</strong> <strong>SEI</strong> to build a model curriculum for s<strong>of</strong>tware assurance education. The <strong>SEI</strong><br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 193<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!